Static task
static1
Behavioral task
behavioral1
Sample
cb569f69cdf7d9fe5226d3f97d389f0f2a401b7af864351db59ab9a38e999275.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb569f69cdf7d9fe5226d3f97d389f0f2a401b7af864351db59ab9a38e999275.exe
Resource
win10v2004-20220812-en
General
-
Target
cb569f69cdf7d9fe5226d3f97d389f0f2a401b7af864351db59ab9a38e999275
-
Size
160KB
-
MD5
1e53788d757ad006ff917326c82326e7
-
SHA1
d7fe5f8e1e60be7b4a518781d42cbb1bad0e15e5
-
SHA256
cb569f69cdf7d9fe5226d3f97d389f0f2a401b7af864351db59ab9a38e999275
-
SHA512
775ca808fcf4a055760b5882ec30695f48322163598ae63e9ba7f74497d23770c47f6053577893b5fd4192684a17fc71f516a1f5fd35e4d419ef1b610975cc79
-
SSDEEP
3072:OIDogObaXZ9KLeOJIdi6niOv1KUZngnFZ6GQyP:OIDoNWXZceOJanikdZgnFZ6GQy
Malware Config
Signatures
Files
-
cb569f69cdf7d9fe5226d3f97d389f0f2a401b7af864351db59ab9a38e999275.exe windows x86
3a6d038c86d39359f000c3dd5dbabd24
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
WaitForMultipleObjects
GetLocalTime
OpenProcess
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
OutputDebugStringA
GetSystemInfo
GetComputerNameA
SetErrorMode
GetSystemDirectoryA
CreateFileA
WriteFile
lstrcmpiA
InitializeCriticalSection
CreateThread
CreateProcessA
MoveFileA
ReadFile
GetFileSize
LocalReAlloc
LocalFree
FindClose
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
CreateDirectoryA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetWindowsDirectoryA
GetProcAddress
lstrcatA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
CancelIo
InterlockedExchange
ResetEvent
GetLastError
EnterCriticalSection
VirtualFree
DeleteCriticalSection
Sleep
CloseHandle
FreeLibrary
SetEvent
LoadLibraryA
TerminateProcess
RaiseException
LocalAlloc
GetStartupInfoA
GetModuleHandleA
advapi32
RegEnumValueA
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
RegOpenKeyA
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSaveKeyA
RegRestoreKeyA
RegQueryInfoKeyA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
DeleteService
CloseServiceHandle
OpenEventLogA
ClearEventLogA
CloseEventLog
RegCreateKeyExA
RegSetValueExA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
shell32
SHGetSpecialFolderPathA
msvcrt
putchar
??3@YAXPAX@Z
memcpy
puts
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strlen
strstr
memcmp
strchr
strcmp
strcpy
malloc
free
_except_handler3
sprintf
atoi
strrchr
strncmp
strncpy
strcat
_errno
wcscpy
strncat
_beginthreadex
system
calloc
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_strrev
memset
??2@YAPAXI@Z
??0exception@@QAE@ABQBD@Z
netapi32
NetLocalGroupAddMembers
NetUserAdd
wtsapi32
WTSQueryUserToken
WTSQuerySessionInformationA
WTSFreeMemory
userenv
CreateEnvironmentBlock
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ